Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe
Resource
win10v2004-20241007-en
General
-
Target
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe
-
Size
1.3MB
-
MD5
201ae8144aced76058811bcf23070290
-
SHA1
f0949cd0a1b002d70385e3ee147df20b64a8542e
-
SHA256
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041
-
SHA512
8dd789fff082f4e872bf4e592ff4fab749d38cad26f543b9399d39125b8019a1f4fc957d8dc297c88fe7dd1b41eea07cadfe7492a04400c15a82a959a0ee7930
-
SSDEEP
24576:FyiWFOB4sNYg2yWQCsMMKSfVrgEEAhmeKKYwOIscs+mXjr6:pB4zgWQ+MFfVrg8hmxKNPs7pf
Malware Config
Extracted
remcos
3.2.1 Pro
Grace_2021
jamaru1444.myftp.biz:2019
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
win32.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NLZOMN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
win
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 3144 win32.exe 3048 win32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" win32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2220 set thread context of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 3144 set thread context of 3048 3144 win32.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3048 win32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 2220 wrote to memory of 1088 2220 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 99 PID 1088 wrote to memory of 1556 1088 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 100 PID 1088 wrote to memory of 1556 1088 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 100 PID 1088 wrote to memory of 1556 1088 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 100 PID 1556 wrote to memory of 3400 1556 WScript.exe 101 PID 1556 wrote to memory of 3400 1556 WScript.exe 101 PID 1556 wrote to memory of 3400 1556 WScript.exe 101 PID 3400 wrote to memory of 3144 3400 cmd.exe 103 PID 3400 wrote to memory of 3144 3400 cmd.exe 103 PID 3400 wrote to memory of 3144 3400 cmd.exe 103 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105 PID 3144 wrote to memory of 3048 3144 win32.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Roaming\win32.exeC:\Users\Admin\AppData\Roaming\win32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Roaming\win32.exe"C:\Users\Admin\AppData\Roaming\win32.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD50023c43bc14320440f81eb67a28e9e99
SHA149ac6fcc2550105a92c6ba7a1194e09bafc00ca3
SHA2565403135310d071b0f43b3b153a3aa636d29d3cf7ccfc2a66550f18e10aa6da21
SHA5125781f081ca10e112af8402de496c87978f06295620a0331f9226bf6f0637da0aacaf952fe1a3e7d1c9dbcfc0a5a578c22267533b7e5fa4a3ba0b6cc5dc3492bf
-
Filesize
148B
MD59148da2360f4b0695836b3ab9fef1c39
SHA1b2cf05b79c65a2394ae8bf72bfe42527343ee666
SHA256efda349f88640e8eb8537f2db60adf4b8a7163211a3f5542b61021fcbf5b78a3
SHA5129c20723467a121b1081f41e87c2f52ac582d8021c71177ed21774d58cfe60b04c08929c76655363dd67252978d18e79c4a90f6156118ca7687756b923ad9a492
-
Filesize
1.3MB
MD5201ae8144aced76058811bcf23070290
SHA1f0949cd0a1b002d70385e3ee147df20b64a8542e
SHA256b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041
SHA5128dd789fff082f4e872bf4e592ff4fab749d38cad26f543b9399d39125b8019a1f4fc957d8dc297c88fe7dd1b41eea07cadfe7492a04400c15a82a959a0ee7930